Results 91 to 100 of about 108,525 (194)
Fingerprint-based biometric systems are widely used because of their advantages against conventional authentication systems based on passwords and tokens.
Hachemi Nabil Dellys +3 more
doaj +1 more source
Double-sided: tight proofs for guessing games in the quantum random oracle model
The semi-classical One-Way to Hiding (SC-O2H) lemma given by Ambainis et al. (CRYPTO 2019) is a crucial technique to solve the reprogramming problem in the quantum random oracle model (QROM), which can lead to quadratically better bounds for many cases ...
Jiawei Bao, Jiangxia Ge, Rui Xue
doaj +1 more source
Injective Banach Spaces of Continuous Functions [PDF]
openaire +2 more sources
Injective Rank Metric Trapdoor Functions with Homogeneous Errors
In rank-metric cryptography, a vector from a finite dimensional linear space over a finite field is viewed as the linear space spanned by its entries. The rank decoding problem which is the analogue of the problem of decoding a random linear code consists in recovering a basis of a random noise vector that was used to perturb a set of random linear ...
Burle, Étienne +3 more
openaire +2 more sources
(Received 14 September, 2009 ; Accepted 19 November, 2009)AbstractBackground and purpose: Squatting test and heart rate variability (HRV) are currently being used to evaluate cardiovascular autonomic nervous function.
Esmaeil Akbari, Abbas Forotan
doaj
Controlling LEF growth in some group extensions. [PDF]
Bradford H.
europepmc +1 more source
Intra-articular injections in sport-active patients with degenerative cartilage lesions or osteoarthritis of the knee: a systematic review. [PDF]
De Marziani L +5 more
europepmc +1 more source
Independent Wavefront Multiplexing with Metasurfaces via Non-Injective Transformation. [PDF]
Jin X, Zentgraf T.
europepmc +1 more source
Stability and Inference of the Euler Characteristic Transform. [PDF]
Marsh L, Beers D.
europepmc +1 more source

